Applied Cryptography Researcher
United Kingdom - Remote
Applications have closed
Summary
As an Applied Cryptography Researcher, you must be a cryptographer with a strong understanding of practical aspects of using cryptography in real world settings. You have the exciting challenge of working on bleeding-edge research and technology, always with a focus on the market's needs. You will work side by side with architects and engineers implementing novel cryptographic primitives that you may have also designed yourself. The scope is everything from Post-Quantum prototypes to hand-optimisation of existing primitives to completely new systems. To support you on this challenge, we have cryptography researchers, software architects, product managers, project managers, formal methods specialists and QA test engineers, with whom you will have high bandwidth communications.
You must possess a pragmatic mindset for building great systems, knowing how to balance features, compromise, technical debt and effort, in order to get products shipped whilst their market impact is high.
Duties
- Extract requirements from product and engineering regarding cryptographic primitives.
- Lead and contribute to novel cryptographic research meeting such requirements.
- Support prototyping of cryptographic systems.
- Translate research into rigorous engineering specifications & implementations.
- Meticulously review cryptographic protocols and proposed primitives.
- Write research papers for submission to top cryptologic conferences and journals.
- Contribute to peer-reviewed publications.
- Participate in weekly research meetings.
Requirements
Key Competencies
- Expert knowledge of ZK protocols, such as PlonK and IPA commitment scheme
- Expert knowledge of elliptic curve cryptography
- Expert knowledge of post quantum security techniques
- Familiarity with blockchain cryptography and constructions
- Practical experience with implementation of cryptographic primitives
- Expert in terms of cryptographic design
- Good understanding of implementation and engineering constraints.
- Security sensibility related to cryptographic implementation
- Excellent theoretical cryptography and mathematical knowledge
- Ability to read cryptographic papers, explain them, and manage delivery of their implementation
Education / Experience
- PhD in Computer Science/Engineering or Applied Mathematics.
- A minimum of 4-5 years development experience in the field
- Experience working with Git and version control
- Expert knowledge of applied cryptography & best practices
Benefits
Location
IOG is a fully distributed organization but due to team distribution, we require someone to be based either in Ireland, the UK or Poland.
All colleagues
- Flexible schedule
- Remote work
- Laptop reimbursement
- New starter package to buy hardware essentials (headphones, monitor, etc)
- Learning & Development opportunities
- Competitive PTO and Sick Leave plan
UK & Ireland Employees
- Monthly Health Stipend to use towards any wellness or medical coverage/service
- Pension
At IOG, we value diversity and always treat all employees and job applicants based on merit, qualifications, competence, and talent. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Blockchain Computer Science Cryptography Mathematics PhD Prototyping
Perks/benefits: Career development Conferences Flex hours Flex vacation Gear Health care Home office stipend Medical leave Wellness
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Cybersecurity Specialist jobs
- Open Security Researcher jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open Security Clearance-related jobs
- Open Forensics-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs